Secure message transmission is of extreme importance in today's information-based society: military, diplomatic, and corporate data transmissions must be safeguarded; so also must the account of every individual who has an automatic-teller bank account or whose purchases are subject to point-of-sale, direct account debiting. The only known way to keep all such transactions secret and authentic is by way of cryptographic techniques. But most cryptosystems in use today are not fool-proof-- their "symmetric" nature allows them to be compromised if either the sender's or the receiver's "key" (decoding algorithm) falls into the wrong hands. This book reports on the enormous amount of work that has been done in the past on the concept, "asymmetric" cryptography.

chapter 1|8 pages


ByGustavus J. Simmons

part Part 1|131 pages

The Contemporary (1981) Scene

chapter 2|29 pages

Computationally “Hard” Problems as a Source for Cryptosystems

ByHugh C. Williams

chapter 3|32 pages

Conventional Versus Public Key Cryptosystems

ByWhitfield Diffie

chapter 4|32 pages

Protocols for Public Key Cryptosystems

ByRalph C. Merkle

chapter 5|35 pages

Message Authentication Without Secrecy

ByGustavus J. Simmons

part Part 2|158 pages

The Origins of the Subject

chapter 6|38 pages

New Directions in Cryptography

ByWhitfield Diffie, Martin E. Hellman

chapter 7|16 pages

Secure Communications over Insecure Channels

ByRalph C. Merkle

chapter 8|19 pages

Hiding Information and Signatures in Trapdoor Knapsacks

ByRalph C. Merkle, Martin E. Hellman

chapter 9|23 pages

A Method for Obtaining Digital Signatures and Public Key Cryptosystems

ByRonald L. Rivest, Adi Shamir, Leonard M. Adleman

chapter 10|58 pages

Symmetric and Asymmetric Encryption

ByGustavus J. Simmons

part Part 3|29 pages

The Future

chapter 11|27 pages

Cryptographic Technology: Fifteen-Year Forecast

ByWhitfield Diffie